助手标题  
全文文献 工具书 数字 学术定义 翻译助手 学术趋势 更多
查询帮助
意见反馈
   漏洞扫描技术 的翻译结果: 查询用时:0.014秒
图标索引 在分类学科中查询
所有学科
互联网技术
更多类别查询

图标索引 历史查询
 

漏洞扫描技术
相关语句
  leak scanning technology
     Computer Network Safety and Leak Scanning Technology
     论计算机网络安全与漏洞扫描技术
短句来源
     The concept, steps and classification of leak scanning are elaborated, and the leak scanning technology of goal computer and network is analyzed, with its role discussed in the network safety.
     从漏洞扫描的概念、步骤和分类等方面进行了描述,并对两种主要的漏洞扫描技术——基于主机的漏洞扫描技术和基于网络的漏洞扫描技术分别进行了分析,阐述了漏洞扫描在计算机网络安全中的作用。
短句来源
     The strategy and steps of leak scanning are elaborated,then some important leak scanning technology is concluded and analyzed,included PING scanning,operating system identification,firewalking and port scanning.
     介绍了漏洞扫描所采用的策略、步骤后,归纳并详细分析了与步骤相对应的几种主要的漏洞扫描技术,其中包括:PING扫描、操作系统探测、如何探测访问控制规则、端口扫描及漏洞检测等.
短句来源
  vulnerability scan
     Aiming at this kind of circumstance, the dissertation does the following works through the foundation of TCP/IP protocol analysis: researching the current vulnerability scan techniques, introducing the necessity of safety scan and security scan's step and the classification.
     针对这种情况,本文在对TCP协议介绍在基础上,对目前的漏洞扫描技术进行了研究,介绍了安全扫描的必要性,以及安全扫描的步骤和分类。
短句来源
     Scan technique include port scan and vulnerability scan which the latter base on the former. The text elaborates their technique and points out the direction of the vulnerability scan technique future development.
     扫描技术包括:端口扫描技术与漏洞扫描技术,漏洞扫描技术是基于端口扫描技术,并分别对它们的技术进行了阐述,指出了漏洞扫描技术未来发展的方向。
短句来源
     In order to do that, the fundament and features of vulnerability scan technology were researched, the author also analyses the develop trends, and classify the security scanner systems, analyses the commonly system structures.
     为达到这一设计目标,本文首先研究了漏洞扫描技术的原理及特点,分析了扫描技术的发展趋势与安全扫描系统的分类,对主要安全扫描器的一般体系结构进行了分析。
短句来源
  leak scan technology
     And then, the fundamental principle and process of leak scan and leak scan technology, including port scan techniques and leak detection techniques, are analyzed and discussed.
     然后分析和讨论了漏洞扫描的基本原理和过程及漏洞扫描技术,包括端口扫描技术和漏洞检测技术;
短句来源
     Finally, as a complement to the leak scan technology, vulnerability analysis technology is also introduced and discussed briefly in the paper.
     最后,作为对网络漏洞扫描技术的补充,简要介绍和讨论了系统脆弱性分析技术。
短句来源
  “漏洞扫描技术”译为未确定词的双语例句
     1. Analyzing current network securing scanning technology, and describe its strategy and methodology in deep.
     (1)、深入地研究了安全漏洞扫描技术,并对其扫描策略和扫描方法进行了详细地分析,为设计安全漏洞扫描系统打下基础。
短句来源
     Analysis and realization of network attack of overflow vulnerability
     基于Windows下溢出漏洞扫描技术的网络渗透分析与实现
短句来源
     Vulnerability-scanning technology and its application in intrusion detection system
     漏洞扫描技术及其在入侵检测系统中的应用
短句来源
     The Study of the Technique for Network Vulnerability Scanning
     网络漏洞扫描技术
短句来源
     Then the technology used in network vulnerability scanning is introduced which includes port scanning, remote OS identification, vulnerability scanning, plugin technology and some network programming technology.
     而后介绍了网络漏洞扫描技术中使用到的关键技术,比如端口扫描、远程操作系统识别、漏洞扫描、插件技术以及一些网络编程的知识。
短句来源
更多       
查询“漏洞扫描技术”译词为用户自定义的双语例句

    我想查看译文中含有:的双语例句
例句
为了更好的帮助您理解掌握查询词或其译词在地道英语中的实际用法,我们为您准备了出自英文原文的大量英语例句,供您参考。
  vulnerability scan
It may be necessary to put a variety of these technologies in place to perform different levels of vulnerability scan.
      
The last step of the vulnerability scan is to present a report to the user.
      


In this paper, the author researched the key technology of network information security of contemporary manufacturing enterprise, include firewall, data encrypt, leak scan, inbreak detect ion etc.and gave an example which apply these technologies to assure the network information security of contemporary manufacturing enterpr ise.

研究现代制造企业保障企业网络信息安全的关键技术 ,包括防火墙技术、加密型网络安全技术、漏洞扫描技术和入侵检测技术等 ,并在此基础上给出了应用这些技术来保障现代制造企业信息安全的应用实例

This paper mainly discusses the design and development of a scanning s ystem for checking vulnerabilities on a Host computer that provides services via Internet. With the analysis of hackers' behaviors and typical attacks, generali zes the inevitability of the existence of security vulnerabilities and summarize s the general condition about network security. Then this paper describes the co ncept, category and limitation of the technique of scanning vulnerability, and a nalyzes the significance and inevitability...

This paper mainly discusses the design and development of a scanning s ystem for checking vulnerabilities on a Host computer that provides services via Internet. With the analysis of hackers' behaviors and typical attacks, generali zes the inevitability of the existence of security vulnerabilities and summarize s the general condition about network security. Then this paper describes the co ncept, category and limitation of the technique of scanning vulnerability, and a nalyzes the significance and inevitability of adopting this technique. This pape r puts the stress on how the scanning system was designed and implemented, inclu ding the design of the system structure, the design and development of internal and external scanning module, and the design of the vulnerability database and r ules database. At last, this paper presents some shortages of this system and pr oposes some advice to extend and perfect the system. 

本文围绕网络主机漏洞扫描系统的设计和实现展开讨论。通过对黑客行为和典型攻击的分析,阐明了网络安全漏洞存在的必然原因,综述了计算机网络安全的现状。研究了漏洞扫描技术的具体概念,分类和局限性,阐明采用漏洞扫描技术的必要性。本文的重心在主机漏洞扫描系统的设计和实现上,包括系统结构的设计和实现,外部扫描模块和内部扫描模块的设计实现,以及漏洞库和规则库的的设计。最后提出了该系统还存在的不足以及需要进一步完善和扩展的设想。

This paper presents the concept and the classification of network security scan, expounds two important technologies of port scan and vulnerability scan contained in network security scan and introduces their principles separately. It discusses parts of the realizations, compares the merits and shortcomings of the scan technologies in port scan. It also introduces the theories of realizations of technologies in vulnerability scan. At last it points out some problems existing in vulnerability scan and gives...

This paper presents the concept and the classification of network security scan, expounds two important technologies of port scan and vulnerability scan contained in network security scan and introduces their principles separately. It discusses parts of the realizations, compares the merits and shortcomings of the scan technologies in port scan. It also introduces the theories of realizations of technologies in vulnerability scan. At last it points out some problems existing in vulnerability scan and gives some suggestions for improvement.

给出了网络安全扫描技术的概念、分类,对其中的两种主要技术——端口扫描技术和漏洞扫描技术以及它们的原理分别进行了详细阐述,讨论了各类端口扫描技术及部分技术的实现,并针对它们的优缺点进行了比较,介绍了各种漏洞扫描技术的实现原理,指出了漏洞扫描中存在的一些问题并给出了一些完善化的建议。

 
<< 更多相关文摘    
图标索引 相关查询

 


 
CNKI小工具
在英文学术搜索中查有关漏洞扫描技术的内容
在知识搜索中查有关漏洞扫描技术的内容
在数字搜索中查有关漏洞扫描技术的内容
在概念知识元中查有关漏洞扫描技术的内容
在学术趋势中查有关漏洞扫描技术的内容
 
 

CNKI主页设CNKI翻译助手为主页 | 收藏CNKI翻译助手 | 广告服务 | 英文学术搜索
版权图标  2008 CNKI-中国知网
京ICP证040431号 互联网出版许可证 新出网证(京)字008号
北京市公安局海淀分局 备案号:110 1081725
版权图标 2008中国知网(cnki) 中国学术期刊(光盘版)电子杂志社